GitHub Access Token became invalid

It seems like the GitHub access token used for retrieving details about this repository from GitHub became invalid. This might prevent certain types of inspections from being run (in particular, everything related to pull requests).
Please ask an admin of your repository to re-new the access token on this website.
Completed
Branch master (356550)
by sebastian
02:47
created
src/jwe/impl/ContentEncryptionKeyFactory.php 3 patches
Doc Comments   +1 added lines, -1 removed lines patch added patch discarded remove patch
@@ -32,7 +32,7 @@
 block discarded – undo
32 32
 
33 33
     /**
34 34
      * @param Key $management_key
35
-     * @param $key_management_mode
35
+     * @param string $key_management_mode
36 36
      * @param ContentEncryptionAlgorithm $enc
37 37
      * @return Key
38 38
      * @throws \Exception
Please login to merge, or discard this patch.
Spacing   +2 added lines, -2 removed lines patch added patch discarded remove patch
@@ -57,7 +57,7 @@  discard block
 block discarded – undo
57 57
                  * The CEK MUST have a length equal to that required for the
58 58
                  * content encryption algorithm.
59 59
                  */
60
-                $rnd       = $generator->invoke($enc->getMinKeyLen()/8);
60
+                $rnd       = $generator->invoke($enc->getMinKeyLen() / 8);
61 61
                 $cek       = new _ContentEncryptionKey($enc->getName(), 'RAW', $rnd);
62 62
             }
63 63
             break;
@@ -85,7 +85,7 @@  discard block
 block discarded – undo
85 85
      * @param EncryptionAlgorithm $alg
86 86
      * @return Key
87 87
      */
88
-    static public function fromRaw($value, EncryptionAlgorithm $alg){
88
+    static public function fromRaw($value, EncryptionAlgorithm $alg) {
89 89
         return  new _ContentEncryptionKey($alg->getName(), 'RAW', $value);
90 90
     }
91 91
 }
92 92
\ No newline at end of file
Please login to merge, or discard this patch.
Indentation   +11 added lines, -11 removed lines patch added patch discarded remove patch
@@ -1,16 +1,16 @@
 block discarded – undo
1 1
 <?php
2 2
 /**
3
- * Copyright 2015 OpenStack Foundation
4
- * Licensed under the Apache License, Version 2.0 (the "License");
5
- * you may not use this file except in compliance with the License.
6
- * You may obtain a copy of the License at
7
- * http://www.apache.org/licenses/LICENSE-2.0
8
- * Unless required by applicable law or agreed to in writing, software
9
- * distributed under the License is distributed on an "AS IS" BASIS,
10
- * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
11
- * See the License for the specific language governing permissions and
12
- * limitations under the License.
13
- **/
3
+     * Copyright 2015 OpenStack Foundation
4
+     * Licensed under the Apache License, Version 2.0 (the "License");
5
+     * you may not use this file except in compliance with the License.
6
+     * You may obtain a copy of the License at
7
+     * http://www.apache.org/licenses/LICENSE-2.0
8
+     * Unless required by applicable law or agreed to in writing, software
9
+     * distributed under the License is distributed on an "AS IS" BASIS,
10
+     * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
11
+     * See the License for the specific language governing permissions and
12
+     * limitations under the License.
13
+     **/
14 14
 
15 15
 namespace jwk;
16 16
 
Please login to merge, or discard this patch.
src/jwe/impl/IVFactory.php 2 patches
Doc Comments   +1 added lines, -1 removed lines patch added patch discarded remove patch
@@ -23,7 +23,7 @@
 block discarded – undo
23 23
 final class IVFactory {
24 24
 
25 25
     /**
26
-     * @param $size
26
+     * @param integer $size
27 27
      * @return string
28 28
      */
29 29
     static public function build($size){
Please login to merge, or discard this patch.
Spacing   +1 added lines, -1 removed lines patch added patch discarded remove patch
@@ -26,7 +26,7 @@
 block discarded – undo
26 26
      * @param $size
27 27
      * @return string
28 28
      */
29
-    static public function build($size){
29
+    static public function build($size) {
30 30
 
31 31
         $generator = Utils_Registry::getInstance()->get(Utils_Registry::RandomNumberGeneratorService);
32 32
         return $generator->invoke($size / 8);
Please login to merge, or discard this patch.
src/jwk/impl/RSAJWK.php 4 patches
Doc Comments   +1 added lines, -1 removed lines patch added patch discarded remove patch
@@ -144,7 +144,7 @@
 block discarded – undo
144 144
 
145 145
     /**
146 146
      * @param PrivateKey $private_key
147
-     * @return IAsymmetricJWK|null
147
+     * @return RSAJWK
148 148
      * @throws InvalidJWKType
149 149
      */
150 150
     static public function fromPrivateKey(PrivateKey $private_key)
Please login to merge, or discard this patch.
Spacing   +5 added lines, -5 removed lines patch added patch discarded remove patch
@@ -112,10 +112,10 @@  discard block
 block discarded – undo
112 112
      */
113 113
     static public function fromKeys(KeyPair $keys)
114 114
     {
115
-        if(!($keys->getPrivate() instanceof RSAPrivateKey))
115
+        if (!($keys->getPrivate() instanceof RSAPrivateKey))
116 116
             throw new \RuntimeException('Private key of invalid type!');
117 117
 
118
-        if(!($keys->getPublic() instanceof RSAPublicKey))
118
+        if (!($keys->getPublic() instanceof RSAPublicKey))
119 119
             throw new \RuntimeException('Public key of invalid type!');
120 120
 
121 121
         $jwk                                          = new RSAJWK();
@@ -165,7 +165,7 @@  discard block
 block discarded – undo
165 165
      */
166 166
     public function getKey($key_op = JSONWebKeyKeyOperationsValues::ComputeDigitalSignatureOrMAC)
167 167
     {
168
-        switch($key_op){
168
+        switch ($key_op) {
169 169
             case JSONWebKeyKeyOperationsValues::ComputeDigitalSignatureOrMAC:
170 170
             case JSONWebKeyKeyOperationsValues::DecryptContentAndValidateDecryption: {
171 171
                 return $this->getPrivateKey();
@@ -177,7 +177,7 @@  discard block
 block discarded – undo
177 177
             }
178 178
             break;
179 179
             default:{
180
-                throw new InvalidJWKUseException(sprintf('key_op %s',  $key_op));
180
+                throw new InvalidJWKUseException(sprintf('key_op %s', $key_op));
181 181
             }
182 182
             break;
183 183
         }
@@ -190,7 +190,7 @@  discard block
 block discarded – undo
190 190
     public function toArray()
191 191
     {
192 192
         $res = parent::toArray();
193
-        if($this->visibility === JSONWebKeyVisibility::PublicOnly){
193
+        if ($this->visibility === JSONWebKeyVisibility::PublicOnly) {
194 194
             //remove private attributes
195 195
             unset($res[RSAKeysParameters::PrivateExponent]);
196 196
             unset($res[RSAKeysParameters::FirstPrimeFactor]);
Please login to merge, or discard this patch.
Braces   +21 added lines, -11 removed lines patch added patch discarded remove patch
@@ -53,11 +53,14 @@  discard block
 block discarded – undo
53 53
 
54 54
         parent::__construct($headers);
55 55
 
56
-        if (count($headers) === 0) return;
56
+        if (count($headers) === 0) {
57
+         return;
58
+        }
57 59
 
58 60
         foreach (RSAKeysParameters::$public_key_params as $p) {
59
-            if (!array_key_exists($p, $headers))
60
-                throw new RSAJWKMissingPublicKeyParamException();
61
+            if (!array_key_exists($p, $headers)) {
62
+                            throw new RSAJWKMissingPublicKeyParamException();
63
+            }
61 64
             $this->set[$p] = new Base64urlUInt($headers[$p]);
62 65
         }
63 66
 
@@ -74,8 +77,9 @@  discard block
 block discarded – undo
74 77
             //its has one private param, must have all ...
75 78
             if (in_array(RSAKeysParameters::FirstPrimeFactor, $headers)) {
76 79
                 foreach (RSAKeysParameters::$producers_private_key_params as $p) {
77
-                    if (!array_key_exists($p, $headers))
78
-                        throw new RSAJWKMissingPrivateKeyParamException();
80
+                    if (!array_key_exists($p, $headers)) {
81
+                                            throw new RSAJWKMissingPrivateKeyParamException();
82
+                    }
79 83
                     $this->set[$p] = new Base64urlUInt($headers[$p]);
80 84
                 }
81 85
                 $this->private_key = RSAFacade::getInstance()->buildPrivateKey(
@@ -112,11 +116,13 @@  discard block
 block discarded – undo
112 116
      */
113 117
     static public function fromKeys(KeyPair $keys)
114 118
     {
115
-        if(!($keys->getPrivate() instanceof RSAPrivateKey))
116
-            throw new \RuntimeException('Private key of invalid type!');
119
+        if(!($keys->getPrivate() instanceof RSAPrivateKey)) {
120
+                    throw new \RuntimeException('Private key of invalid type!');
121
+        }
117 122
 
118
-        if(!($keys->getPublic() instanceof RSAPublicKey))
119
-            throw new \RuntimeException('Public key of invalid type!');
123
+        if(!($keys->getPublic() instanceof RSAPublicKey)) {
124
+                    throw new \RuntimeException('Public key of invalid type!');
125
+        }
120 126
 
121 127
         $jwk                                          = new RSAJWK();
122 128
         $jwk->public_key                              = $keys->getPublic();
@@ -134,7 +140,9 @@  discard block
 block discarded – undo
134 140
      */
135 141
     static public function fromPublicKey(PublicKey $public_key)
136 142
     {
137
-        if (!($public_key instanceof RSAPublicKey)) throw new InvalidJWKType();
143
+        if (!($public_key instanceof RSAPublicKey)) {
144
+         throw new InvalidJWKType();
145
+        }
138 146
         $jwk = new RSAJWK();
139 147
         $jwk->public_key = $public_key;
140 148
         $jwk->set[RSAKeysParameters::Exponent] = Base64urlUInt::fromBigInt($public_key->getPublicExponent());
@@ -149,7 +157,9 @@  discard block
 block discarded – undo
149 157
      */
150 158
     static public function fromPrivateKey(PrivateKey $private_key)
151 159
     {
152
-        if (!($private_key instanceof RSAPrivateKey)) throw new InvalidJWKType();
160
+        if (!($private_key instanceof RSAPrivateKey)) {
161
+         throw new InvalidJWKType();
162
+        }
153 163
         $jwk = new RSAJWK();
154 164
         $jwk->private_key = $private_key;
155 165
         $jwk->set[RSAKeysParameters::Exponent] = Base64urlUInt::fromBigInt($private_key->getPublicExponent());
Please login to merge, or discard this patch.
Indentation   +11 added lines, -11 removed lines patch added patch discarded remove patch
@@ -1,16 +1,16 @@
 block discarded – undo
1 1
 <?php
2 2
 /**
3
- * Copyright 2015 OpenStack Foundation
4
- * Licensed under the Apache License, Version 2.0 (the "License");
5
- * you may not use this file except in compliance with the License.
6
- * You may obtain a copy of the License at
7
- * http://www.apache.org/licenses/LICENSE-2.0
8
- * Unless required by applicable law or agreed to in writing, software
9
- * distributed under the License is distributed on an "AS IS" BASIS,
10
- * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
11
- * See the License for the specific language governing permissions and
12
- * limitations under the License.
13
- **/
3
+     * Copyright 2015 OpenStack Foundation
4
+     * Licensed under the Apache License, Version 2.0 (the "License");
5
+     * you may not use this file except in compliance with the License.
6
+     * You may obtain a copy of the License at
7
+     * http://www.apache.org/licenses/LICENSE-2.0
8
+     * Unless required by applicable law or agreed to in writing, software
9
+     * distributed under the License is distributed on an "AS IS" BASIS,
10
+     * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
11
+     * See the License for the specific language governing permissions and
12
+     * limitations under the License.
13
+     **/
14 14
 
15 15
 namespace jwk;
16 16
 
Please login to merge, or discard this patch.
src/jws/impl/JWS.php 4 patches
Unused Use Statements   -1 removed lines patch added patch discarded remove patch
@@ -39,7 +39,6 @@
 block discarded – undo
39 39
 use jwt\utils\JOSEHeaderSerializer;
40 40
 use jwt\utils\JWTClaimSetSerializer;
41 41
 use jwt\utils\JWTRawSerializer;
42
-use utils\json_types\JsonArray;
43 42
 use utils\json_types\JsonValue;
44 43
 use utils\json_types\StringOrURI;
45 44
 
Please login to merge, or discard this patch.
Indentation   +16 added lines, -16 removed lines patch added patch discarded remove patch
@@ -1,16 +1,16 @@  discard block
 block discarded – undo
1 1
 <?php
2 2
 /**
3
- * Copyright 2015 OpenStack Foundation
4
- * Licensed under the Apache License, Version 2.0 (the "License");
5
- * you may not use this file except in compliance with the License.
6
- * You may obtain a copy of the License at
7
- * http://www.apache.org/licenses/LICENSE-2.0
8
- * Unless required by applicable law or agreed to in writing, software
9
- * distributed under the License is distributed on an "AS IS" BASIS,
10
- * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
11
- * See the License for the specific language governing permissions and
12
- * limitations under the License.
13
- **/
3
+     * Copyright 2015 OpenStack Foundation
4
+     * Licensed under the Apache License, Version 2.0 (the "License");
5
+     * you may not use this file except in compliance with the License.
6
+     * You may obtain a copy of the License at
7
+     * http://www.apache.org/licenses/LICENSE-2.0
8
+     * Unless required by applicable law or agreed to in writing, software
9
+     * distributed under the License is distributed on an "AS IS" BASIS,
10
+     * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
11
+     * See the License for the specific language governing permissions and
12
+     * limitations under the License.
13
+     **/
14 14
 
15 15
 namespace jws\impl;
16 16
 
@@ -305,11 +305,11 @@  discard block
 block discarded – undo
305 305
     }
306 306
 
307 307
      /**
308
-     * @param IJOSEHeader $header
309
-     * @param IJWSPayloadSpec $payload
310
-     * @param string $signature
311
-     * @return IJWS
312
-     */
308
+      * @param IJOSEHeader $header
309
+      * @param IJWSPayloadSpec $payload
310
+      * @param string $signature
311
+      * @return IJWS
312
+      */
313 313
     static public function fromHeaderClaimsAndSignature(IJOSEHeader $header, IJWSPayloadSpec $payload = null , $signature = '')
314 314
     {
315 315
         return new JWS($header, $payload, $signature );
Please login to merge, or discard this patch.
Spacing   +38 added lines, -50 removed lines patch added patch discarded remove patch
@@ -72,14 +72,14 @@  discard block
 block discarded – undo
72 72
 
73 73
         $claim_set = null;
74 74
 
75
-        if(!is_null($payload) && $payload->isClaimSet() && $payload instanceof IJWSPayloadClaimSetSpec) {
75
+        if (!is_null($payload) && $payload->isClaimSet() && $payload instanceof IJWSPayloadClaimSetSpec) {
76 76
             $header->addHeader(new JOSEHeaderParam(RegisteredJOSEHeaderNames::Type, new StringOrURI('JWT')));
77 77
             $claim_set = $payload->getClaimSet();
78 78
         }
79 79
 
80 80
         parent::__construct($header, $claim_set);
81 81
 
82
-        if(!is_null($payload))
82
+        if (!is_null($payload))
83 83
             $this->setPayload($payload);
84 84
 
85 85
         $this->signature = $signature;
@@ -100,21 +100,18 @@  discard block
 block discarded – undo
100 100
      */
101 101
     public function toCompactSerialization()
102 102
     {
103
-        if(!is_null($this->jwk->getId()))
103
+        if (!is_null($this->jwk->getId()))
104 104
             $this->header->addHeader(new JOSEHeaderParam(RegisteredJOSEHeaderNames::KeyID, $this->jwk->getId()));
105 105
 
106
-        if($this->jwk instanceof IAsymmetricJWK)
106
+        if ($this->jwk instanceof IAsymmetricJWK)
107 107
         {
108 108
             // we should add the public key on the header
109 109
             $public_key = clone $this->jwk;
110 110
 
111
-            $this->header->addHeader
112
-            (
113
-                new JOSEHeaderParam
114
-                (
111
+            $this->header->addHeader(
112
+                new JOSEHeaderParam(
115 113
                     RegisteredJOSEHeaderNames::JSONWebKey,
116
-                    new JsonValue
117
-                    (
114
+                    new JsonValue(
118 115
                         $public_key->setVisibility(JSONWebKeyVisibility::PublicOnly)
119 116
                     )
120 117
                 )
@@ -134,32 +131,32 @@  discard block
 block discarded – undo
134 131
     public function sign()
135 132
     {
136 133
 
137
-        if(is_null($this->jwk))
134
+        if (is_null($this->jwk))
138 135
             throw new JWSInvalidJWKException;
139 136
 
140
-        if($this->jwk->getKeyUse()->getString() !== JSONWebKeyPublicKeyUseValues::Signature)
137
+        if ($this->jwk->getKeyUse()->getString() !== JSONWebKeyPublicKeyUseValues::Signature)
141 138
             throw new JWSInvalidJWKException(sprintf('use %s not supported.', $this->jwk->getKeyUse()->getString()));
142 139
 
143 140
         $alg = DigitalSignatures_MACs_Registry::getInstance()->get($this->header->getAlgorithm()->getString());
144 141
 
145
-        if(is_null($alg))
146
-            throw new JWSNotSupportedAlgorithm(sprintf('alg %s.',$this->header->getAlgorithm()->getString()));
142
+        if (is_null($alg))
143
+            throw new JWSNotSupportedAlgorithm(sprintf('alg %s.', $this->header->getAlgorithm()->getString()));
147 144
 
148
-        $secured_input_bytes = JOSEHeaderSerializer::serialize($this->header) . IBasicJWT::SegmentSeparator .$this->getEncodedPayload();
145
+        $secured_input_bytes = JOSEHeaderSerializer::serialize($this->header).IBasicJWT::SegmentSeparator.$this->getEncodedPayload();
149 146
 
150
-        $key  = $this->jwk->getKey(JSONWebKeyKeyOperationsValues::ComputeDigitalSignatureOrMAC);
147
+        $key = $this->jwk->getKey(JSONWebKeyKeyOperationsValues::ComputeDigitalSignatureOrMAC);
151 148
 
152
-        if($alg instanceof DigitalSignatureAlgorithm)
149
+        if ($alg instanceof DigitalSignatureAlgorithm)
153 150
         {
154 151
             $this->signature = $alg->sign($key, $secured_input_bytes);
155 152
         }
156
-        else if($alg instanceof MAC_Algorithm )
153
+        else if ($alg instanceof MAC_Algorithm)
157 154
         {
158 155
             $this->signature = $alg->digest($key, $secured_input_bytes);
159 156
         }
160 157
         else
161 158
         {
162
-            throw new JWSNotSupportedAlgorithm(sprintf('alg %s.',$this->header->getAlgorithm()->getString()));
159
+            throw new JWSNotSupportedAlgorithm(sprintf('alg %s.', $this->header->getAlgorithm()->getString()));
163 160
         }
164 161
 
165 162
         return $this;
@@ -171,11 +168,11 @@  discard block
 block discarded – undo
171 168
      */
172 169
     public function getEncodedPayload()
173 170
     {
174
-        if(is_null($this->payload))
171
+        if (is_null($this->payload))
175 172
             throw new JWSInvalidPayloadException('payload is not set!');
176 173
 
177 174
         $enc_payload = '';
178
-        if($this->payload->isClaimSet() && $this->payload instanceof IJWSPayloadClaimSetSpec)
175
+        if ($this->payload->isClaimSet() && $this->payload instanceof IJWSPayloadClaimSetSpec)
179 176
         {
180 177
             $enc_payload = JWTClaimSetSerializer::serialize($this->payload->getClaimSet());
181 178
         }
@@ -233,27 +230,23 @@  discard block
 block discarded – undo
233 230
      */
234 231
     public function verify($original_alg)
235 232
     {
236
-        if(is_null($this->jwk))
233
+        if (is_null($this->jwk))
237 234
             throw new JWSInvalidJWKException;
238 235
 
239
-        if($this->jwk->getKeyUse()->getString() !== JSONWebKeyPublicKeyUseValues::Signature)
240
-            throw new JWSInvalidJWKException
241
-            (
242
-                sprintf
243
-                (
236
+        if ($this->jwk->getKeyUse()->getString() !== JSONWebKeyPublicKeyUseValues::Signature)
237
+            throw new JWSInvalidJWKException(
238
+                sprintf(
244 239
                     'use %s not supported ',
245 240
                     $this->jwk->getKeyUse()->getString()
246 241
                 )
247 242
             );
248 243
 
249
-        if(is_null($this->jwk->getAlgorithm()))
244
+        if (is_null($this->jwk->getAlgorithm()))
250 245
             throw new InvalidJWKAlgorithm('algorithm intended for use with the key is not set! ');
251 246
 
252
-        if(!is_null($this->jwk->getId()) && !is_null($this->header->getKeyID()) && $this->header->getKeyID()->getValue() != $this->jwk->getId()->getValue())
253
-            throw new JWSInvalidJWKException
254
-            (
255
-                sprintf
256
-                (
247
+        if (!is_null($this->jwk->getId()) && !is_null($this->header->getKeyID()) && $this->header->getKeyID()->getValue() != $this->jwk->getId()->getValue())
248
+            throw new JWSInvalidJWKException(
249
+                sprintf(
257 250
                     'original kid %s - current kid %s',
258 251
                     $this->header->getKeyID()->getValue(),
259 252
                     $this->jwk->getId()->getValue()
@@ -262,34 +255,30 @@  discard block
 block discarded – undo
262 255
 
263 256
         $alg = DigitalSignatures_MACs_Registry::getInstance()->get($original_alg);
264 257
 
265
-        if(is_null($alg))
258
+        if (is_null($alg))
266 259
             throw new JWSNotSupportedAlgorithm(sprintf('algo %s', $original_alg));
267 260
 
268 261
         $former_alg = $this->header->getAlgorithm()->getString();
269 262
 
270
-        if($former_alg != $original_alg)
271
-            throw new JWSNotSupportedAlgorithm
272
-            (
273
-                sprintf
274
-                (
263
+        if ($former_alg != $original_alg)
264
+            throw new JWSNotSupportedAlgorithm(
265
+                sprintf(
275 266
                     'former alg %s - original alg %s',
276 267
                     $former_alg,
277 268
                     $original_alg
278 269
                 )
279 270
             );
280 271
 
281
-        if($this->jwk->getAlgorithm()->getValue() !==  $original_alg)
282
-            throw new InvalidJWKAlgorithm
283
-            (
284
-                sprintf
285
-                (
272
+        if ($this->jwk->getAlgorithm()->getValue() !== $original_alg)
273
+            throw new InvalidJWKAlgorithm(
274
+                sprintf(
286 275
                     'mismatch between algorithm intended for use with the key %s and the cryptographic algorithm used to secure the JWS %s',
287 276
                     $this->jwk->getAlgorithm()->getValue(),
288 277
                     $original_alg
289 278
                 )
290 279
             );
291 280
 
292
-        $secured_input_bytes = JOSEHeaderSerializer::serialize($this->header) . IBasicJWT::SegmentSeparator .$this->getEncodedPayload();
281
+        $secured_input_bytes = JOSEHeaderSerializer::serialize($this->header).IBasicJWT::SegmentSeparator.$this->getEncodedPayload();
293 282
 
294 283
         // use public key / secret
295 284
         $key = $this->jwk->getKey(JSONWebKeyKeyOperationsValues::VerifyDigitalSignatureOrMAC);
@@ -310,9 +299,9 @@  discard block
 block discarded – undo
310 299
      * @param string $signature
311 300
      * @return IJWS
312 301
      */
313
-    static public function fromHeaderClaimsAndSignature(IJOSEHeader $header, IJWSPayloadSpec $payload = null , $signature = '')
302
+    static public function fromHeaderClaimsAndSignature(IJOSEHeader $header, IJWSPayloadSpec $payload = null, $signature = '')
314 303
     {
315
-        return new JWS($header, $payload, $signature );
304
+        return new JWS($header, $payload, $signature);
316 305
     }
317 306
 
318 307
     /**
@@ -320,10 +309,9 @@  discard block
 block discarded – undo
320 309
      */
321 310
     public function take()
322 311
     {
323
-        $payload = $this->payload->isClaimSet() ?  $this->claim_set : $this->payload->getRaw();
312
+        $payload = $this->payload->isClaimSet() ? $this->claim_set : $this->payload->getRaw();
324 313
 
325
-        return array
326
-        (
314
+        return array(
327 315
             $this->header,
328 316
             $payload,
329 317
             $this->signature
Please login to merge, or discard this patch.
Braces   +42 added lines, -32 removed lines patch added patch discarded remove patch
@@ -79,8 +79,9 @@  discard block
 block discarded – undo
79 79
 
80 80
         parent::__construct($header, $claim_set);
81 81
 
82
-        if(!is_null($payload))
83
-            $this->setPayload($payload);
82
+        if(!is_null($payload)) {
83
+                    $this->setPayload($payload);
84
+        }
84 85
 
85 86
         $this->signature = $signature;
86 87
     }
@@ -100,8 +101,9 @@  discard block
 block discarded – undo
100 101
      */
101 102
     public function toCompactSerialization()
102 103
     {
103
-        if(!is_null($this->jwk->getId()))
104
-            $this->header->addHeader(new JOSEHeaderParam(RegisteredJOSEHeaderNames::KeyID, $this->jwk->getId()));
104
+        if(!is_null($this->jwk->getId())) {
105
+                    $this->header->addHeader(new JOSEHeaderParam(RegisteredJOSEHeaderNames::KeyID, $this->jwk->getId()));
106
+        }
105 107
 
106 108
         if($this->jwk instanceof IAsymmetricJWK)
107 109
         {
@@ -134,16 +136,19 @@  discard block
 block discarded – undo
134 136
     public function sign()
135 137
     {
136 138
 
137
-        if(is_null($this->jwk))
138
-            throw new JWSInvalidJWKException;
139
+        if(is_null($this->jwk)) {
140
+                    throw new JWSInvalidJWKException;
141
+        }
139 142
 
140
-        if($this->jwk->getKeyUse()->getString() !== JSONWebKeyPublicKeyUseValues::Signature)
141
-            throw new JWSInvalidJWKException(sprintf('use %s not supported.', $this->jwk->getKeyUse()->getString()));
143
+        if($this->jwk->getKeyUse()->getString() !== JSONWebKeyPublicKeyUseValues::Signature) {
144
+                    throw new JWSInvalidJWKException(sprintf('use %s not supported.', $this->jwk->getKeyUse()->getString()));
145
+        }
142 146
 
143 147
         $alg = DigitalSignatures_MACs_Registry::getInstance()->get($this->header->getAlgorithm()->getString());
144 148
 
145
-        if(is_null($alg))
146
-            throw new JWSNotSupportedAlgorithm(sprintf('alg %s.',$this->header->getAlgorithm()->getString()));
149
+        if(is_null($alg)) {
150
+                    throw new JWSNotSupportedAlgorithm(sprintf('alg %s.',$this->header->getAlgorithm()->getString()));
151
+        }
147 152
 
148 153
         $secured_input_bytes = JOSEHeaderSerializer::serialize($this->header) . IBasicJWT::SegmentSeparator .$this->getEncodedPayload();
149 154
 
@@ -152,12 +157,10 @@  discard block
 block discarded – undo
152 157
         if($alg instanceof DigitalSignatureAlgorithm)
153 158
         {
154 159
             $this->signature = $alg->sign($key, $secured_input_bytes);
155
-        }
156
-        else if($alg instanceof MAC_Algorithm )
160
+        } else if($alg instanceof MAC_Algorithm )
157 161
         {
158 162
             $this->signature = $alg->digest($key, $secured_input_bytes);
159
-        }
160
-        else
163
+        } else
161 164
         {
162 165
             throw new JWSNotSupportedAlgorithm(sprintf('alg %s.',$this->header->getAlgorithm()->getString()));
163 166
         }
@@ -171,15 +174,15 @@  discard block
 block discarded – undo
171 174
      */
172 175
     public function getEncodedPayload()
173 176
     {
174
-        if(is_null($this->payload))
175
-            throw new JWSInvalidPayloadException('payload is not set!');
177
+        if(is_null($this->payload)) {
178
+                    throw new JWSInvalidPayloadException('payload is not set!');
179
+        }
176 180
 
177 181
         $enc_payload = '';
178 182
         if($this->payload->isClaimSet() && $this->payload instanceof IJWSPayloadClaimSetSpec)
179 183
         {
180 184
             $enc_payload = JWTClaimSetSerializer::serialize($this->payload->getClaimSet());
181
-        }
182
-        else
185
+        } else
183 186
         {
184 187
             $enc_payload = JWTRawSerializer::serialize($this->payload->getRaw());
185 188
         }
@@ -233,11 +236,12 @@  discard block
 block discarded – undo
233 236
      */
234 237
     public function verify($original_alg)
235 238
     {
236
-        if(is_null($this->jwk))
237
-            throw new JWSInvalidJWKException;
239
+        if(is_null($this->jwk)) {
240
+                    throw new JWSInvalidJWKException;
241
+        }
238 242
 
239
-        if($this->jwk->getKeyUse()->getString() !== JSONWebKeyPublicKeyUseValues::Signature)
240
-            throw new JWSInvalidJWKException
243
+        if($this->jwk->getKeyUse()->getString() !== JSONWebKeyPublicKeyUseValues::Signature) {
244
+                    throw new JWSInvalidJWKException
241 245
             (
242 246
                 sprintf
243 247
                 (
@@ -245,12 +249,14 @@  discard block
 block discarded – undo
245 249
                     $this->jwk->getKeyUse()->getString()
246 250
                 )
247 251
             );
252
+        }
248 253
 
249
-        if(is_null($this->jwk->getAlgorithm()))
250
-            throw new InvalidJWKAlgorithm('algorithm intended for use with the key is not set! ');
254
+        if(is_null($this->jwk->getAlgorithm())) {
255
+                    throw new InvalidJWKAlgorithm('algorithm intended for use with the key is not set! ');
256
+        }
251 257
 
252
-        if(!is_null($this->jwk->getId()) && !is_null($this->header->getKeyID()) && $this->header->getKeyID()->getValue() != $this->jwk->getId()->getValue())
253
-            throw new JWSInvalidJWKException
258
+        if(!is_null($this->jwk->getId()) && !is_null($this->header->getKeyID()) && $this->header->getKeyID()->getValue() != $this->jwk->getId()->getValue()) {
259
+                    throw new JWSInvalidJWKException
254 260
             (
255 261
                 sprintf
256 262
                 (
@@ -259,16 +265,18 @@  discard block
 block discarded – undo
259 265
                     $this->jwk->getId()->getValue()
260 266
                 )
261 267
             );
268
+        }
262 269
 
263 270
         $alg = DigitalSignatures_MACs_Registry::getInstance()->get($original_alg);
264 271
 
265
-        if(is_null($alg))
266
-            throw new JWSNotSupportedAlgorithm(sprintf('algo %s', $original_alg));
272
+        if(is_null($alg)) {
273
+                    throw new JWSNotSupportedAlgorithm(sprintf('algo %s', $original_alg));
274
+        }
267 275
 
268 276
         $former_alg = $this->header->getAlgorithm()->getString();
269 277
 
270
-        if($former_alg != $original_alg)
271
-            throw new JWSNotSupportedAlgorithm
278
+        if($former_alg != $original_alg) {
279
+                    throw new JWSNotSupportedAlgorithm
272 280
             (
273 281
                 sprintf
274 282
                 (
@@ -277,9 +285,10 @@  discard block
 block discarded – undo
277 285
                     $original_alg
278 286
                 )
279 287
             );
288
+        }
280 289
 
281
-        if($this->jwk->getAlgorithm()->getValue() !==  $original_alg)
282
-            throw new InvalidJWKAlgorithm
290
+        if($this->jwk->getAlgorithm()->getValue() !==  $original_alg) {
291
+                    throw new InvalidJWKAlgorithm
283 292
             (
284 293
                 sprintf
285 294
                 (
@@ -288,6 +297,7 @@  discard block
 block discarded – undo
288 297
                     $original_alg
289 298
                 )
290 299
             );
300
+        }
291 301
 
292 302
         $secured_input_bytes = JOSEHeaderSerializer::serialize($this->header) . IBasicJWT::SegmentSeparator .$this->getEncodedPayload();
293 303
 
Please login to merge, or discard this patch.
src/jwa/cryptographic_algorithms/KeyManagementAlgorithms_Registry.php 3 patches
Spacing   +3 added lines, -3 removed lines patch added patch discarded remove patch
@@ -43,14 +43,14 @@  discard block
 block discarded – undo
43 43
         $this->algorithms[JSONWebSignatureAndEncryptionAlgorithms::Dir] = new DirAlgorithm;
44 44
     }
45 45
 
46
-    private function __clone(){}
46
+    private function __clone() {}
47 47
 
48 48
     /**
49 49
      * @return KeyManagementAlgorithms_Registry
50 50
      */
51 51
     public static function getInstance()
52 52
     {
53
-        if(!is_object(self::$instance))
53
+        if (!is_object(self::$instance))
54 54
         {
55 55
             self::$instance = new KeyManagementAlgorithms_Registry();
56 56
         }
@@ -72,7 +72,7 @@  discard block
 block discarded – undo
72 72
      */
73 73
     public function get($alg)
74 74
     {
75
-        if(!$this->isSupported($alg)) return null;
75
+        if (!$this->isSupported($alg)) return null;
76 76
         return $this->algorithms[$alg];
77 77
     }
78 78
 }
79 79
\ No newline at end of file
Please login to merge, or discard this patch.
Indentation   +11 added lines, -11 removed lines patch added patch discarded remove patch
@@ -1,16 +1,16 @@
 block discarded – undo
1 1
 <?php
2 2
 /**
3
- * Copyright 2015 OpenStack Foundation
4
- * Licensed under the Apache License, Version 2.0 (the "License");
5
- * you may not use this file except in compliance with the License.
6
- * You may obtain a copy of the License at
7
- * http://www.apache.org/licenses/LICENSE-2.0
8
- * Unless required by applicable law or agreed to in writing, software
9
- * distributed under the License is distributed on an "AS IS" BASIS,
10
- * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
11
- * See the License for the specific language governing permissions and
12
- * limitations under the License.
13
- **/
3
+     * Copyright 2015 OpenStack Foundation
4
+     * Licensed under the Apache License, Version 2.0 (the "License");
5
+     * you may not use this file except in compliance with the License.
6
+     * You may obtain a copy of the License at
7
+     * http://www.apache.org/licenses/LICENSE-2.0
8
+     * Unless required by applicable law or agreed to in writing, software
9
+     * distributed under the License is distributed on an "AS IS" BASIS,
10
+     * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
11
+     * See the License for the specific language governing permissions and
12
+     * limitations under the License.
13
+     **/
14 14
 
15 15
 namespace jwk;
16 16
 
Please login to merge, or discard this patch.
Braces   +3 added lines, -1 removed lines patch added patch discarded remove patch
@@ -64,7 +64,9 @@
 block discarded – undo
64 64
      * @return null|CompressionAlgorithm
65 65
      */
66 66
     public function get($alg){
67
-        if(!$this->isSupported($alg)) return null;
67
+        if(!$this->isSupported($alg)) {
68
+         return null;
69
+        }
68 70
         return $this->algorithms[$alg];
69 71
     }
70 72
 }
71 73
\ No newline at end of file
Please login to merge, or discard this patch.
src/jwa/cryptographic_algorithms/macs/HSMAC_Algorithm.php 3 patches
Spacing   +5 added lines, -5 removed lines patch added patch discarded remove patch
@@ -35,10 +35,10 @@  discard block
 block discarded – undo
35 35
      * @return string
36 36
      * @throws InvalidKeyLengthAlgorithmException
37 37
      */
38
-    public function digest(SharedKey $key, $message){
38
+    public function digest(SharedKey $key, $message) {
39 39
 
40
-        if($this->getMinKeyLen() > $key->getBitLength())
41
-            throw new InvalidKeyLengthAlgorithmException(sprintf('min len %s - cur len %s.',$this->getMinKeyLen(), $key->getBitLength()));
40
+        if ($this->getMinKeyLen() > $key->getBitLength())
41
+            throw new InvalidKeyLengthAlgorithmException(sprintf('min len %s - cur len %s.', $this->getMinKeyLen(), $key->getBitLength()));
42 42
 
43 43
         return hash_hmac($this->getHashingAlgorithm(), $message, $key->getSecret(), true);
44 44
     }
@@ -51,8 +51,8 @@  discard block
 block discarded – undo
51 51
      * @throws InvalidKeyLengthAlgorithmException
52 52
      * @throws InvalidKeyTypeAlgorithmException
53 53
      */
54
-    public function verify(Key $key, $message, $digest){
55
-        if(!($key instanceof SharedKey)) throw new InvalidKeyTypeAlgorithmException;
54
+    public function verify(Key $key, $message, $digest) {
55
+        if (!($key instanceof SharedKey)) throw new InvalidKeyTypeAlgorithmException;
56 56
 
57 57
         return $digest === $this->digest($key, $message);
58 58
     }
Please login to merge, or discard this patch.
Braces   +6 added lines, -3 removed lines patch added patch discarded remove patch
@@ -37,8 +37,9 @@  discard block
 block discarded – undo
37 37
      */
38 38
     public function digest(SharedKey $key, $message){
39 39
 
40
-        if($this->getMinKeyLen() > $key->getBitLength())
41
-            throw new InvalidKeyLengthAlgorithmException(sprintf('min len %s - cur len %s.',$this->getMinKeyLen(), $key->getBitLength()));
40
+        if($this->getMinKeyLen() > $key->getBitLength()) {
41
+                    throw new InvalidKeyLengthAlgorithmException(sprintf('min len %s - cur len %s.',$this->getMinKeyLen(), $key->getBitLength()));
42
+        }
42 43
 
43 44
         return hash_hmac($this->getHashingAlgorithm(), $message, $key->getSecret(), true);
44 45
     }
@@ -52,7 +53,9 @@  discard block
 block discarded – undo
52 53
      * @throws InvalidKeyTypeAlgorithmException
53 54
      */
54 55
     public function verify(Key $key, $message, $digest){
55
-        if(!($key instanceof SharedKey)) throw new InvalidKeyTypeAlgorithmException;
56
+        if(!($key instanceof SharedKey)) {
57
+         throw new InvalidKeyTypeAlgorithmException;
58
+        }
56 59
 
57 60
         return $digest === $this->digest($key, $message);
58 61
     }
Please login to merge, or discard this patch.
Indentation   +11 added lines, -11 removed lines patch added patch discarded remove patch
@@ -1,16 +1,16 @@
 block discarded – undo
1 1
 <?php
2 2
 /**
3
- * Copyright 2015 OpenStack Foundation
4
- * Licensed under the Apache License, Version 2.0 (the "License");
5
- * you may not use this file except in compliance with the License.
6
- * You may obtain a copy of the License at
7
- * http://www.apache.org/licenses/LICENSE-2.0
8
- * Unless required by applicable law or agreed to in writing, software
9
- * distributed under the License is distributed on an "AS IS" BASIS,
10
- * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
11
- * See the License for the specific language governing permissions and
12
- * limitations under the License.
13
- **/
3
+     * Copyright 2015 OpenStack Foundation
4
+     * Licensed under the Apache License, Version 2.0 (the "License");
5
+     * you may not use this file except in compliance with the License.
6
+     * You may obtain a copy of the License at
7
+     * http://www.apache.org/licenses/LICENSE-2.0
8
+     * Unless required by applicable law or agreed to in writing, software
9
+     * distributed under the License is distributed on an "AS IS" BASIS,
10
+     * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
11
+     * See the License for the specific language governing permissions and
12
+     * limitations under the License.
13
+     **/
14 14
 
15 15
 namespace jwk;
16 16
 
Please login to merge, or discard this patch.
src/jwa/cryptographic_algorithms/ContentEncryptionAlgorithms_Registry.php 1 patch
Braces   +3 added lines, -1 removed lines patch added patch discarded remove patch
@@ -68,7 +68,9 @@
 block discarded – undo
68 68
      * @return null|ContentEncryptionAlgorithm
69 69
      */
70 70
     public function get($alg) {
71
-        if (!$this->isSupported($alg)) return null;
71
+        if (!$this->isSupported($alg)) {
72
+         return null;
73
+        }
72 74
         return $this->algorithms[$alg];
73 75
     }
74 76
 }
75 77
\ No newline at end of file
Please login to merge, or discard this patch.
src/jwa/cryptographic_algorithms/digital_signatures/rsa/RSA_Algorithm.php 3 patches
Spacing   +8 added lines, -8 removed lines patch added patch discarded remove patch
@@ -45,14 +45,14 @@  discard block
 block discarded – undo
45 45
      */
46 46
     public function sign(PrivateKey $private_key, $message)
47 47
     {
48
-        if(!($private_key instanceof RSAPrivateKey)) throw new InvalidKeyTypeAlgorithmException;
48
+        if (!($private_key instanceof RSAPrivateKey)) throw new InvalidKeyTypeAlgorithmException;
49 49
 
50
-        if($this->getMinKeyLen() > $private_key->getBitLength())
51
-            throw new InvalidKeyLengthAlgorithmException(sprintf('min len %s - cur len %s.',$this->getMinKeyLen(), $private_key->getBitLength()));
50
+        if ($this->getMinKeyLen() > $private_key->getBitLength())
51
+            throw new InvalidKeyLengthAlgorithmException(sprintf('min len %s - cur len %s.', $this->getMinKeyLen(), $private_key->getBitLength()));
52 52
 
53 53
         $res = $this->rsa_impl->loadKey($private_key->getEncoded());
54 54
 
55
-        if(!$res) throw new InvalidKeyTypeAlgorithmException;
55
+        if (!$res) throw new InvalidKeyTypeAlgorithmException;
56 56
 
57 57
         $this->rsa_impl->setHash($this->getHashingAlgorithm());
58 58
         $this->rsa_impl->setMGFHash($this->getHashingAlgorithm());
@@ -70,14 +70,14 @@  discard block
 block discarded – undo
70 70
      */
71 71
     public function verify(Key $key, $message, $signature)
72 72
     {
73
-        if(!($key instanceof RSAPublicKey)) throw new InvalidKeyTypeAlgorithmException;
73
+        if (!($key instanceof RSAPublicKey)) throw new InvalidKeyTypeAlgorithmException;
74 74
 
75
-        if($this->getMinKeyLen() > $key->getBitLength())
76
-            throw new InvalidKeyLengthAlgorithmException(sprintf('min len %s - cur len %s.',$this->getMinKeyLen(), $key->getBitLength()));
75
+        if ($this->getMinKeyLen() > $key->getBitLength())
76
+            throw new InvalidKeyLengthAlgorithmException(sprintf('min len %s - cur len %s.', $this->getMinKeyLen(), $key->getBitLength()));
77 77
 
78 78
         $res = $this->rsa_impl->loadKey($key->getEncoded());
79 79
 
80
-        if(!$res) throw new InvalidKeyTypeAlgorithmException;
80
+        if (!$res) throw new InvalidKeyTypeAlgorithmException;
81 81
 
82 82
         $this->rsa_impl->setHash($this->getHashingAlgorithm());
83 83
         $this->rsa_impl->setMGFHash($this->getHashingAlgorithm());
Please login to merge, or discard this patch.
Braces   +18 added lines, -8 removed lines patch added patch discarded remove patch
@@ -45,14 +45,19 @@  discard block
 block discarded – undo
45 45
      */
46 46
     public function sign(PrivateKey $private_key, $message)
47 47
     {
48
-        if(!($private_key instanceof RSAPrivateKey)) throw new InvalidKeyTypeAlgorithmException;
48
+        if(!($private_key instanceof RSAPrivateKey)) {
49
+         throw new InvalidKeyTypeAlgorithmException;
50
+        }
49 51
 
50
-        if($this->getMinKeyLen() > $private_key->getBitLength())
51
-            throw new InvalidKeyLengthAlgorithmException(sprintf('min len %s - cur len %s.',$this->getMinKeyLen(), $private_key->getBitLength()));
52
+        if($this->getMinKeyLen() > $private_key->getBitLength()) {
53
+                    throw new InvalidKeyLengthAlgorithmException(sprintf('min len %s - cur len %s.',$this->getMinKeyLen(), $private_key->getBitLength()));
54
+        }
52 55
 
53 56
         $res = $this->rsa_impl->loadKey($private_key->getEncoded());
54 57
 
55
-        if(!$res) throw new InvalidKeyTypeAlgorithmException;
58
+        if(!$res) {
59
+         throw new InvalidKeyTypeAlgorithmException;
60
+        }
56 61
 
57 62
         $this->rsa_impl->setHash($this->getHashingAlgorithm());
58 63
         $this->rsa_impl->setMGFHash($this->getHashingAlgorithm());
@@ -70,14 +75,19 @@  discard block
 block discarded – undo
70 75
      */
71 76
     public function verify(Key $key, $message, $signature)
72 77
     {
73
-        if(!($key instanceof RSAPublicKey)) throw new InvalidKeyTypeAlgorithmException;
78
+        if(!($key instanceof RSAPublicKey)) {
79
+         throw new InvalidKeyTypeAlgorithmException;
80
+        }
74 81
 
75
-        if($this->getMinKeyLen() > $key->getBitLength())
76
-            throw new InvalidKeyLengthAlgorithmException(sprintf('min len %s - cur len %s.',$this->getMinKeyLen(), $key->getBitLength()));
82
+        if($this->getMinKeyLen() > $key->getBitLength()) {
83
+                    throw new InvalidKeyLengthAlgorithmException(sprintf('min len %s - cur len %s.',$this->getMinKeyLen(), $key->getBitLength()));
84
+        }
77 85
 
78 86
         $res = $this->rsa_impl->loadKey($key->getEncoded());
79 87
 
80
-        if(!$res) throw new InvalidKeyTypeAlgorithmException;
88
+        if(!$res) {
89
+         throw new InvalidKeyTypeAlgorithmException;
90
+        }
81 91
 
82 92
         $this->rsa_impl->setHash($this->getHashingAlgorithm());
83 93
         $this->rsa_impl->setMGFHash($this->getHashingAlgorithm());
Please login to merge, or discard this patch.
Indentation   +11 added lines, -11 removed lines patch added patch discarded remove patch
@@ -1,16 +1,16 @@
 block discarded – undo
1 1
 <?php
2 2
 /**
3
- * Copyright 2015 OpenStack Foundation
4
- * Licensed under the Apache License, Version 2.0 (the "License");
5
- * you may not use this file except in compliance with the License.
6
- * You may obtain a copy of the License at
7
- * http://www.apache.org/licenses/LICENSE-2.0
8
- * Unless required by applicable law or agreed to in writing, software
9
- * distributed under the License is distributed on an "AS IS" BASIS,
10
- * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
11
- * See the License for the specific language governing permissions and
12
- * limitations under the License.
13
- **/
3
+     * Copyright 2015 OpenStack Foundation
4
+     * Licensed under the Apache License, Version 2.0 (the "License");
5
+     * you may not use this file except in compliance with the License.
6
+     * You may obtain a copy of the License at
7
+     * http://www.apache.org/licenses/LICENSE-2.0
8
+     * Unless required by applicable law or agreed to in writing, software
9
+     * distributed under the License is distributed on an "AS IS" BASIS,
10
+     * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
11
+     * See the License for the specific language governing permissions and
12
+     * limitations under the License.
13
+     **/
14 14
 
15 15
 namespace jwk;
16 16
 
Please login to merge, or discard this patch.
cryptographic_algorithms/key_management/rsa/RSA_KeyManagementAlgorithm.php 3 patches
Spacing   +10 added lines, -10 removed lines patch added patch discarded remove patch
@@ -30,7 +30,7 @@  discard block
 block discarded – undo
30 30
     extends Abstract_RSA_Algorithm
31 31
     implements EncryptionAlgorithm, KeyEncryption {
32 32
 
33
-    public function __construct(){
33
+    public function __construct() {
34 34
 
35 35
         parent::__construct();
36 36
         //configuration ...
@@ -47,18 +47,18 @@  discard block
 block discarded – undo
47 47
      */
48 48
     public function encrypt(Key $key, $message)
49 49
     {
50
-        if(!($key instanceof RSAPublicKey))
50
+        if (!($key instanceof RSAPublicKey))
51 51
             throw new InvalidKeyTypeAlgorithmException('key is not public');
52 52
 
53
-        if($key->getFormat() !== 'PKCS8')
53
+        if ($key->getFormat() !== 'PKCS8')
54 54
             throw new InvalidKeyTypeAlgorithmException('keys is not on PKCS1 format');
55 55
 
56 56
         $res = $this->rsa_impl->loadKey($key->getEncoded());
57 57
 
58
-        if(!$res)
58
+        if (!$res)
59 59
             throw new InvalidKeyTypeAlgorithmException('could not parse the key');
60 60
 
61
-        if($this->rsa_impl->getSize() < $this->getMinKeyLen())
61
+        if ($this->rsa_impl->getSize() < $this->getMinKeyLen())
62 62
             throw new InvalidKeyTypeAlgorithmException('len is invalid');
63 63
 
64 64
         return $this->rsa_impl->encrypt($message);
@@ -70,21 +70,21 @@  discard block
 block discarded – undo
70 70
      * @return string
71 71
      * @throws InvalidKeyTypeAlgorithmException
72 72
      */
73
-    public function decrypt(Key $key, $enc_message){
73
+    public function decrypt(Key $key, $enc_message) {
74 74
 
75
-        if(!($key instanceof RSAPrivateKey))
75
+        if (!($key instanceof RSAPrivateKey))
76 76
             throw new InvalidKeyTypeAlgorithmException('key is not private');
77 77
 
78 78
 
79
-        if($key->getFormat() !== 'PKCS1')
79
+        if ($key->getFormat() !== 'PKCS1')
80 80
             throw new InvalidKeyTypeAlgorithmException('keys is not on PKCS1 format');
81 81
 
82 82
         $res = $this->rsa_impl->loadKey($key->getEncoded());
83 83
 
84
-        if(!$res)
84
+        if (!$res)
85 85
             throw new InvalidKeyTypeAlgorithmException('could not parse the key');
86 86
 
87
-        if($this->rsa_impl->getSize() < $this->getMinKeyLen())
87
+        if ($this->rsa_impl->getSize() < $this->getMinKeyLen())
88 88
             throw new InvalidKeyTypeAlgorithmException('len is invalid');
89 89
 
90 90
         return $this->rsa_impl->decrypt($enc_message);
Please login to merge, or discard this patch.
Braces   +24 added lines, -16 removed lines patch added patch discarded remove patch
@@ -47,19 +47,23 @@  discard block
 block discarded – undo
47 47
      */
48 48
     public function encrypt(Key $key, $message)
49 49
     {
50
-        if(!($key instanceof RSAPublicKey))
51
-            throw new InvalidKeyTypeAlgorithmException('key is not public');
50
+        if(!($key instanceof RSAPublicKey)) {
51
+                    throw new InvalidKeyTypeAlgorithmException('key is not public');
52
+        }
52 53
 
53
-        if($key->getFormat() !== 'PKCS8')
54
-            throw new InvalidKeyTypeAlgorithmException('keys is not on PKCS1 format');
54
+        if($key->getFormat() !== 'PKCS8') {
55
+                    throw new InvalidKeyTypeAlgorithmException('keys is not on PKCS1 format');
56
+        }
55 57
 
56 58
         $res = $this->rsa_impl->loadKey($key->getEncoded());
57 59
 
58
-        if(!$res)
59
-            throw new InvalidKeyTypeAlgorithmException('could not parse the key');
60
+        if(!$res) {
61
+                    throw new InvalidKeyTypeAlgorithmException('could not parse the key');
62
+        }
60 63
 
61
-        if($this->rsa_impl->getSize() < $this->getMinKeyLen())
62
-            throw new InvalidKeyTypeAlgorithmException('len is invalid');
64
+        if($this->rsa_impl->getSize() < $this->getMinKeyLen()) {
65
+                    throw new InvalidKeyTypeAlgorithmException('len is invalid');
66
+        }
63 67
 
64 68
         return $this->rsa_impl->encrypt($message);
65 69
     }
@@ -72,20 +76,24 @@  discard block
 block discarded – undo
72 76
      */
73 77
     public function decrypt(Key $key, $enc_message){
74 78
 
75
-        if(!($key instanceof RSAPrivateKey))
76
-            throw new InvalidKeyTypeAlgorithmException('key is not private');
79
+        if(!($key instanceof RSAPrivateKey)) {
80
+                    throw new InvalidKeyTypeAlgorithmException('key is not private');
81
+        }
77 82
 
78 83
 
79
-        if($key->getFormat() !== 'PKCS1')
80
-            throw new InvalidKeyTypeAlgorithmException('keys is not on PKCS1 format');
84
+        if($key->getFormat() !== 'PKCS1') {
85
+                    throw new InvalidKeyTypeAlgorithmException('keys is not on PKCS1 format');
86
+        }
81 87
 
82 88
         $res = $this->rsa_impl->loadKey($key->getEncoded());
83 89
 
84
-        if(!$res)
85
-            throw new InvalidKeyTypeAlgorithmException('could not parse the key');
90
+        if(!$res) {
91
+                    throw new InvalidKeyTypeAlgorithmException('could not parse the key');
92
+        }
86 93
 
87
-        if($this->rsa_impl->getSize() < $this->getMinKeyLen())
88
-            throw new InvalidKeyTypeAlgorithmException('len is invalid');
94
+        if($this->rsa_impl->getSize() < $this->getMinKeyLen()) {
95
+                    throw new InvalidKeyTypeAlgorithmException('len is invalid');
96
+        }
89 97
 
90 98
         return $this->rsa_impl->decrypt($enc_message);
91 99
     }
Please login to merge, or discard this patch.
Indentation   +11 added lines, -11 removed lines patch added patch discarded remove patch
@@ -1,16 +1,16 @@
 block discarded – undo
1 1
 <?php
2 2
 /**
3
- * Copyright 2015 OpenStack Foundation
4
- * Licensed under the Apache License, Version 2.0 (the "License");
5
- * you may not use this file except in compliance with the License.
6
- * You may obtain a copy of the License at
7
- * http://www.apache.org/licenses/LICENSE-2.0
8
- * Unless required by applicable law or agreed to in writing, software
9
- * distributed under the License is distributed on an "AS IS" BASIS,
10
- * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
11
- * See the License for the specific language governing permissions and
12
- * limitations under the License.
13
- **/
3
+     * Copyright 2015 OpenStack Foundation
4
+     * Licensed under the Apache License, Version 2.0 (the "License");
5
+     * you may not use this file except in compliance with the License.
6
+     * You may obtain a copy of the License at
7
+     * http://www.apache.org/licenses/LICENSE-2.0
8
+     * Unless required by applicable law or agreed to in writing, software
9
+     * distributed under the License is distributed on an "AS IS" BASIS,
10
+     * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
11
+     * See the License for the specific language governing permissions and
12
+     * limitations under the License.
13
+     **/
14 14
 
15 15
 namespace jwk;
16 16
 
Please login to merge, or discard this patch.